CVE-2010-20112

N/A Unknown
Published: August 21, 2025 Modified: April 15, 2026
View on NVD

Description

Amlib’s NetOpacs webquery.dll contains a stack-based buffer overflow vulnerability triggered by improper handling of HTTP GET parameters. Specifically, the application fails to enforce bounds on input supplied to the app parameter, allowing excessive data to overwrite memory structures including the Structured Exception Handler (SEH). Additionally, malformed parameter names followed by an equals sign may result in unintended control flow behavior. This vulnerability is exposed through IIS and affects legacy Windows deployments

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
48.2%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)